About your Search

20130416
20130424
Search Results 0 to 4 of about 5
personnel along our borders as well as utilization of proven surveillance technology along the highest traffic areas across the southwest border. reducing wait times at the ports of entry the budget requests 35rks00 port officers. to scurel maritime borders the budget invests in coast guard assets, including the seven national security cutter and fast response cutters. the bum continues the department's focus on smart enforcement of our country's immigration laws. it supports the administration's effort to focus the enforcement system on safety threats and the integrity of the immigration system through childhood arrivals and greater use of rosecutor yull discretion. we support more cost effective initiatives of secure communities. e budget invests in monitory compliance to work sight related laws. while continuing to support alternatives to the tension, detention reform and immigrant immigration efforts. comprehensive immigration reform will help us build on these efforts and strengthen boarder security by enabling d.h.s. while focusing on criminals, human smallingers and those who im
technology, it's the only way to track them. if we invested what we should've in the air traffic system, we would have -- may not solve all of chuck's problems, but a much faster, flowing system. >> by the way, if you modernize it, you can cut back on some of the workforce permanently and save money there. that's the other issue. it's very labor intensive because of the issue that steve just described. >> before we go to break, the president is dining tonight with members of the senate, all women, isn't that nice? >> that's great. >> chuck todd, thank you. we'll see you at 9:00 on the "daily rundown." >> i'm surprised that didn't get ugly just then. >> right. >> that's great. >> we went to counseling. >>> up next, steve rattner has charts on signs of a spring slowdown. more "morning joe" when we come back. but i wondered what a i tcustomer thought? is great, hi nia... nice to meet you nia, i'm mike. what do you drive? i have a ford explorer, i love my car. and you're treating it well? yes i am. there are a lot of places you could take your explorer for service, why do you bring it back to t
to our critical infrastructure. >> how do you work to prevent this? >> we have technology, cyber technologies, prevention technologies. we spend a lot of time now on technologies.
time, you could argue that it means a decrease in personnel. because you're using technology, using cameras to replace, you know, eyeballs. but i don't think we've come to that determination. we're down -- the police department is down 6,000 police officers than where we were 11 years ago. so we've already sort of paid the price. and we're using to a certain extent technology to plug the gaps. we're increasing the number of cameras that we have. one of the things that we're doing, we had it in motion prior to the boston marathon. but we want to increase the number of mobile cameras that we have so we can put them up at events and then move them to other events. along our marathon route, we have 220 cameras. but most of them are on bridges. we want to increase at least the public sector cameras that we have along that route. >> all right. new york city police commissioner, ray kelly, thank you very much. it's always good to see you. >> thank you for the great job you keep doing for the city. >> thank you. >>> a new book on afghanistan that's not so good. president hamid karzai had to
records are prime targets for attackers to steal. according to the information technology industry council, 18 adults become victims to cybercrime, including identity campaigns ishing every second. this adds up to 1 1/2 million cybercrime victims each day. cyberattacks present a very real and dangerous threat to the united states, however the government currently
Search Results 0 to 4 of about 5